SlideShare a Scribd company logo
1 of 11
Token Ring
Token Ring
• IEEE 802.5 – Token ring
Token Ring
– set of nodes connected in a ring.
– Data always flow in a particular direction around the ring.
– Each node in the ring receiving the frame from its upstream neighbor and
then forwarding them to its downstream neighbor.
Token – used to access the ring
• Token is a special sequence of bits, circulates around the ring.
• Each node receives and forwards the token.
– When a node sees the token,
• If it has a frame to transmit, it takes the token off the ring and inserts the frame
into the ring.
• Each node along the way simply forwards the frame. Destination node saving
the copy of the frame into the adaptor and forwards the message to the next
node.
• When the frame reaches the sender, it strips the frame off the ring and reinserts
the token.
Token Ring Contd…
– Each node in the ring gets a chance to transmit.
– Nodes are serviced in a round robin manner.
Physical Properties
– Uses ring topology.
– Problem – any node or link failure leads to entire network failure.
Solution:
• Connecting each station into the ring using electromechanical relay.
– If station is healthy, relay is opened. i.e., station is included in the ring.
– If station fails, it stops providing power. So relay is closed and the ring
automatically bypasses the station.
Token Ring Contd…
Multi station Access Unit (MSAU)
– Several relays packed into a single box.
– Easy to add / remove stations from the network.
Characteristics:
– Supports 4Mbps or 16Mbps data rate.
– Differential Manchester encoding scheme is used.
– Number of stations in the ring is limited to 250 for IEEE802.5 (260 for IBM
Token ring).
Token Ring Contd…
Token ring Media Access Control
– Network adaptor of the token ring contains a receiver, transmitter and one
or more bits of data storage between them.
– When none of the stations has anything to send, the token circulates around
the ring.
– Ring has enough storage capacity to hold an entire token.
• 1 bit / station
– For example, 24 bit token can circulate in the network having maximum 24
stations.
• But it will not work proper for network having lesser number of stations than
24.
– This will be avoided by “Monitor”
Token Operation:
– Token circulates around the ring, any station that has data to send may seize the
token.
• i.e., it drains the token off the ring and begin sending data.
• Seizing process just involves modifying 1bit in second byte of the token
Token Ring Contd…
– Station that has token can send data.
– Each transmitted packet contains the destination address of the intended
receiver.
• It may be unicast address, multicast address or broadcast address.
– Each node in the ring look inside the packet to see if it is the intended
receiver.
• If so, copies the data frame and pass it to the ring and the packet find the way
back to the sender.
– Then sending station remove the frame from the ring and reinserts the token
to the ring.
Issues:
– How much data a given node is allowed to transmit?
Token Holding Time (THT) – time period given to nodes to hold the token.
• But unfair to stations to other than the station holding the token
• This will be avoided using TRT (Token Rotation Time)
TRT ≤ Active nodes * THT + Ring Latency
Token Ring Contd…
Ring Latency – how long it takes the token to circulate around the ring when
no one has data to send.
Active nodes – number of nodes that have data to send.
Reliable Transmission
– IEEE 802.5 provides reliable data delivery using 2 bits (A&C) in the packet trailer.
– Initially these bits are set to 0.
– When a station sees a frame for which it is the intended recipient,
• It sets A bit into ‘1’
– When it copies the frame into local adaptor buffer,
• It sets the C bit into ‘1’
– When the sender sees the frame come back over the ring
• If A = 0 – receiver is not functioning well.
• If A = 1, but C = 0 then destination does not accepted the frame due to some reason (eg., Lack of
buffer)
Priority Bits:
• The token contains 3 bit priority field.
• Each device that want to transmit the packet assigns a priority to that packet & the device can hold the
token, if the priority is at least as great as tokens priority.
• Lower priority packets circulate for long in ring
Token Release
– Early Release
• After transmitting packet
– Delayed Release
• After removing the packet when it returns to the sender
Token Ring Contd…
Token Ring Maintenance:
– Token rings have a designated monitor.
– The monitor’s job is ensure the health of the token.
– Any station in the ring can become the monitor.
• Monitor is first elected when the ring is first connected or failure of the current
monitor.
– Healthy monitor periodically announces its presence with a special control
message.
• If a station fails to see the control message for some period of time, it will
assume that the monitor has failed and will try to become the monitor.
– When a station decides that a new monitor is needed, it transmits a “Claim
Token” frame, announcing its intent to become the new monitor.
• If the token circulates back to the sender, it can assume that it is OK for it to
become a monitor.
• If some other is trying to become the monitor at the same instant, the sender
might see the “claim token” message from that other station first,
– Highest Address wins
Token Ring Contd…
Roles of Monitor:
• May need to insert additional delay into the ring
• Detecting the missing token
• Watches for a passing token and maintains a timer equal to the maximum
possible token rotation time.
(NumStations * THT) + Ring Latency
Ring Latency – total propagation delay on the ring.
• Checks for corrupted or orphaned frame.
 Corrupted frame – checksum error or invalid formats.
 Orphaned frame – transmitted correctly on the ring, but whose parent died.
i.e., sending station went down before it could remove the frame from the ring.
• Its detected by using a “Monitor” bit.
• Monitor bit is “0” on transmission
• Set to ‘1’ when it passes the monitor first time.
• If the monitor sees a frame with this bit is set, it knows the frame is going by
for the second time and it drains the frame off the ring.
• Detection of dead stations.
 If any station suspects failure on the ring, it can send “beacon” frame to suspect
destination.
• Status of the ring can be established and malfunctioning station can be bypassed in the MSAU
Token Ring Contd…
Frame Format:
– “illegal” Manchester codes in the start and end delimiters.
– Access Control – includes frame priority, reservation priority.
– Frame Control – Demux key that identifies the higher layer protocol.
– 48 bit Destination and source hardware addresses
– Checksum – error detection code
– Frame Status – includes A & C bits

More Related Content

What's hot

User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithmBasit Hussain
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5Pnkj_Sharma
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring Hareem Naz
 
Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Shail Nakum
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer ProtocolsMeenakshi Paul
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 

What's hot (20)

User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Data link layer
Data link layer Data link layer
Data link layer
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Unit 4 - Network Layer
Unit 4 - Network LayerUnit 4 - Network Layer
Unit 4 - Network Layer
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Tcp
TcpTcp
Tcp
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
HDLC
HDLCHDLC
HDLC
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 

Similar to Token ring

Token ring protocol
Token ring protocolToken ring protocol
Token ring protocolpriyabogra1
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area networkRiteshKumar630578
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxAkarshTomar3
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptxpatrickwang85
 
A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks Nt Arvind
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networksNt Arvind
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
 

Similar to Token ring (20)

Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
Token ring protocol
Token ring protocolToken ring protocol
Token ring protocol
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptx
 
Token Bus.pptx
Token Bus.pptxToken Bus.pptx
Token Bus.pptx
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
FDDI
FDDIFDDI
FDDI
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Token_Ring.pdf
Token_Ring.pdfToken_Ring.pdf
Token_Ring.pdf
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
Data link layer
Data link layerData link layer
Data link layer
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 

More from selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Flow Control
Flow ControlFlow Control
Flow Control
 
Ethernet
EthernetEthernet
Ethernet
 
DNS
DNS DNS
DNS
 
DHCP
DHCPDHCP
DHCP
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

Token ring

  • 2. Token Ring • IEEE 802.5 – Token ring Token Ring – set of nodes connected in a ring. – Data always flow in a particular direction around the ring. – Each node in the ring receiving the frame from its upstream neighbor and then forwarding them to its downstream neighbor. Token – used to access the ring • Token is a special sequence of bits, circulates around the ring. • Each node receives and forwards the token. – When a node sees the token, • If it has a frame to transmit, it takes the token off the ring and inserts the frame into the ring. • Each node along the way simply forwards the frame. Destination node saving the copy of the frame into the adaptor and forwards the message to the next node. • When the frame reaches the sender, it strips the frame off the ring and reinserts the token.
  • 3. Token Ring Contd… – Each node in the ring gets a chance to transmit. – Nodes are serviced in a round robin manner. Physical Properties – Uses ring topology. – Problem – any node or link failure leads to entire network failure. Solution: • Connecting each station into the ring using electromechanical relay. – If station is healthy, relay is opened. i.e., station is included in the ring. – If station fails, it stops providing power. So relay is closed and the ring automatically bypasses the station.
  • 4. Token Ring Contd… Multi station Access Unit (MSAU) – Several relays packed into a single box. – Easy to add / remove stations from the network. Characteristics: – Supports 4Mbps or 16Mbps data rate. – Differential Manchester encoding scheme is used. – Number of stations in the ring is limited to 250 for IEEE802.5 (260 for IBM Token ring).
  • 5. Token Ring Contd… Token ring Media Access Control – Network adaptor of the token ring contains a receiver, transmitter and one or more bits of data storage between them. – When none of the stations has anything to send, the token circulates around the ring. – Ring has enough storage capacity to hold an entire token. • 1 bit / station – For example, 24 bit token can circulate in the network having maximum 24 stations. • But it will not work proper for network having lesser number of stations than 24. – This will be avoided by “Monitor” Token Operation: – Token circulates around the ring, any station that has data to send may seize the token. • i.e., it drains the token off the ring and begin sending data. • Seizing process just involves modifying 1bit in second byte of the token
  • 6. Token Ring Contd… – Station that has token can send data. – Each transmitted packet contains the destination address of the intended receiver. • It may be unicast address, multicast address or broadcast address. – Each node in the ring look inside the packet to see if it is the intended receiver. • If so, copies the data frame and pass it to the ring and the packet find the way back to the sender. – Then sending station remove the frame from the ring and reinserts the token to the ring. Issues: – How much data a given node is allowed to transmit? Token Holding Time (THT) – time period given to nodes to hold the token. • But unfair to stations to other than the station holding the token • This will be avoided using TRT (Token Rotation Time) TRT ≤ Active nodes * THT + Ring Latency
  • 7. Token Ring Contd… Ring Latency – how long it takes the token to circulate around the ring when no one has data to send. Active nodes – number of nodes that have data to send. Reliable Transmission – IEEE 802.5 provides reliable data delivery using 2 bits (A&C) in the packet trailer. – Initially these bits are set to 0. – When a station sees a frame for which it is the intended recipient, • It sets A bit into ‘1’ – When it copies the frame into local adaptor buffer, • It sets the C bit into ‘1’ – When the sender sees the frame come back over the ring • If A = 0 – receiver is not functioning well. • If A = 1, but C = 0 then destination does not accepted the frame due to some reason (eg., Lack of buffer) Priority Bits: • The token contains 3 bit priority field. • Each device that want to transmit the packet assigns a priority to that packet & the device can hold the token, if the priority is at least as great as tokens priority. • Lower priority packets circulate for long in ring
  • 8. Token Release – Early Release • After transmitting packet – Delayed Release • After removing the packet when it returns to the sender
  • 9. Token Ring Contd… Token Ring Maintenance: – Token rings have a designated monitor. – The monitor’s job is ensure the health of the token. – Any station in the ring can become the monitor. • Monitor is first elected when the ring is first connected or failure of the current monitor. – Healthy monitor periodically announces its presence with a special control message. • If a station fails to see the control message for some period of time, it will assume that the monitor has failed and will try to become the monitor. – When a station decides that a new monitor is needed, it transmits a “Claim Token” frame, announcing its intent to become the new monitor. • If the token circulates back to the sender, it can assume that it is OK for it to become a monitor. • If some other is trying to become the monitor at the same instant, the sender might see the “claim token” message from that other station first, – Highest Address wins
  • 10. Token Ring Contd… Roles of Monitor: • May need to insert additional delay into the ring • Detecting the missing token • Watches for a passing token and maintains a timer equal to the maximum possible token rotation time. (NumStations * THT) + Ring Latency Ring Latency – total propagation delay on the ring. • Checks for corrupted or orphaned frame.  Corrupted frame – checksum error or invalid formats.  Orphaned frame – transmitted correctly on the ring, but whose parent died. i.e., sending station went down before it could remove the frame from the ring. • Its detected by using a “Monitor” bit. • Monitor bit is “0” on transmission • Set to ‘1’ when it passes the monitor first time. • If the monitor sees a frame with this bit is set, it knows the frame is going by for the second time and it drains the frame off the ring. • Detection of dead stations.  If any station suspects failure on the ring, it can send “beacon” frame to suspect destination. • Status of the ring can be established and malfunctioning station can be bypassed in the MSAU
  • 11. Token Ring Contd… Frame Format: – “illegal” Manchester codes in the start and end delimiters. – Access Control – includes frame priority, reservation priority. – Frame Control – Demux key that identifies the higher layer protocol. – 48 bit Destination and source hardware addresses – Checksum – error detection code – Frame Status – includes A & C bits